A Secure Cluster Formation Scheme in Wireless Sensor Networks

무선 센서 네트워크에서 안전한 클러스터 구성 방안

  • Received : 2012.01.06
  • Accepted : 2012.08.20
  • Published : 2012.08.25

Abstract

In wireless sensor networks, cluster structure brings on many advantages such as load balancing, energy saving, and distributed key management, and so on. To transform a physical network into the cluster structure, sensor nodes should invoke a cluster formation protocol. During the protocol operation, if some nodes are compromised and they do not conform to the protocol, an inconsistency of membership in a cluster happen. This splits the cluster and consequently increases the number of clusters and decreases the number of members in the cluster. In this paper, we propose a scheme which well copes with such a problem. First, our scheme generates two hop clusters where hop distance between any two nodes is at most two. Besides, our scheme employs verification of two hop distant nodes to prevent the cluster split induced by compromised nodes. Last, our scheme mainly employs broadcast transmissions to reduce energy consumption of nodes. Simulation results have proven that our scheme reduces the number of clusters and more secure and energy-efficient than other scheme.

무선 센서 네트워크에서 클러스터 구조는 부하균형, 에너지 절약, 분산 키 관리와 같은 중요한 이점들을 유발한다. 네트워크를 클러스터 구조로 변경하기 위해서 센서들은 배치된 후에 클러스터 구성 프로토콜을 실행해야 한다. 이때 일부 노드들이 공격자에 의해 오염될 수 있으며 이들이 클러스터 구성 프로토콜에 따르지 않으면 임의의 클러스터에서 멤버십의 비일치가 발생한다. 이러한 경우에 클러스터들은 분할되게 되며 이에 따라 클러스터 수는 증가하고 클러스터내의 멤버수가 줄어드는 문제점이 발생한다. 본 논문에서는 오염노드들의 프로토콜 비협조에 잘 대처하는 기법을 제안한다. 먼저, 제안방법은 클러스터 내에서 임의의 두 노드 간에 거리가 최대 2홉이 되는 2홉 클러스터들을 생성한다. 게다가 제안방법은 오염노드에 의한 클러스터들의 분할을 막기 위해 2홉 거리의 노드에 의한 검증을 이용한다. 또한 제안방법은 노드들의 에너지 소모를 감소시키기 위하여 주로 방송전송들을 이용한다. 실험결과들은 제안방법이 다른 방법에 비해 클러스터 수를 감소시키며 좀 더 안전하고 에너지 효율적임을 보여주었다.

Keywords

References

  1. W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp. 660-670, Oct. 2002. https://doi.org/10.1109/TWC.2002.804190
  2. O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 3, No. 4, pp. 366-379, Oct. 2004. https://doi.org/10.1109/TMC.2004.41
  3. G. Gupta and M. Younis, "Performance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks," in Proc. of the 10th Int'l Conf. on Telecommunications, Vol. 2, pp. 1577-1583, Mar. 2003.
  4. G. Wang, K. Song, and G. Cho, "DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks," IEICE Transactions on Information and Systems, Vol. E93-D, No. 6, pp. 1560-1571, Jun. 2010 https://doi.org/10.1587/transinf.E93.D.1560
  5. G. Wang and G. Cho, "Clustering-based Key Renewals for Clustered Sensor Networks," IEICE Transactions on Communications, Vol. E92-B, No. 2, 612-615, Feb. 2009. https://doi.org/10.1587/transcom.E92.B.612
  6. M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, "Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks," in Proc. of Int'l Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 1-10, Apr. 2007.
  7. Q. Dong and D. Liu, "Resilient Cluster Leader Election for Wireless Sensor Networks, in Proc. of IEEE 6th Annual Communication Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 108-116, Rome, Italy, Jun. 2009.
  8. G. Wang and G. Cho, "Secure Cluster Head Election Using Mark Based Exclusion in Wireless Sensor Networks," IEICE Transactions on Communications, Vol. E93-B, No. 11, pp. 2925-2935, Nov. 2010. https://doi.org/10.1587/transcom.E93.B.2925
  9. A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro, "On the Security of Cluster-based Communication Protocols for Wireless Sensor Networks," in Proc. of 4th IEEE Int'l Conf. on Networking, Vol. 3420, pp. 449-458, 2005.
  10. L. B. Oliveira, H. C. Wong, M. W. Bern, R. Dahab, and A. A. Loureiro, "SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks," in Proc. of 5th IEEE Int'l Symposium On Network Computing and Applications, pp. 145-154, Cambridge, MA, USA, Jul. 2006.
  11. D. Liu, "Resilient Cluster Formation for Sensor Networks," in Proc. of 27th Int'l Conf. on Distributed Computing Systems, pp. 40-48, Toronto, ON, Canada, Jun. 2007.
  12. K. Sun, P. Peng, P. Ning, and C. Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks," in Proc. of the 22nd Annual Conf. on Computer Security Applications, pp. 131-140, Miami, FL, USA, Dec. 2006.
  13. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Vol. 8, No. 5, pp. 521-534, Sep. 2002. https://doi.org/10.1023/A:1016598314198
  14. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," in Proc. of 3rd Int'l Conf. on Pervasive Computing and Communications, pp. 324-328, Mar. 2005.
  15. J. R. Douceur, "The Sybil Attack," in Proc. of the 1st Int'l Workshop on Peer-to-peer Systems, pp. 251-260, Cambridge, MA, USA, Mar. 7-8, Mar. 2002.
  16. Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 370-380, Feb. 2006 https://doi.org/10.1109/JSAC.2005.861394
  17. B. Parno, A. Perrig, and V. Gilgor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proc. of 2005 IEEE Symposium on Security and Privacy, pp. 49-63, Washington, DC, USA, May 2005.